Web Security Flashcards

(80 cards)

1
Q

Define Weakness

A

A Condition that could introduce a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Vulnerability

A

A Defect with security consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a Threat

A

A potential danger to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define an Attack

A

An attempt to compromise, disrupt, or gain unauthorized access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define an Exploit

A

A method to bypass security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does TTP stand for in the realm of network threats and attacks?

A

TTP stands for Tactics, Techniques, and Procedures - each tactic (the What) can have multiple techniques (the How) associated with it. Procedures are real-life examples of technique use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Threat?

A

A Threat is something that directly impacts operational activities in a negative way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Vulnerability?

A

A Vulnerability is a weakness in a piece of software, system, or procedure that may be exploited or triggered by a threat source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the CIA triad in terms of cybersecurity?

A

The CIA triad is Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does OSI stand for?

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many layers are in the OSI Model?

A

Seven layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of OSI Layer 1 (Physical)?

A

Transmitting raw bits over a physical medium using electrical, optical, or radio signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of OSI Layer 2 (Data Link)?

A

Transmitting frames between devices on the same local network using MAC addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What device primarily operates at OSI Layer 2?

A

A network switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of OSI Layer 3 (Network)?

A

Routing packets between different networks using IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What device primarily operates at OSI Layer 3?

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the function of OSI Layer 4 (Transport)?

A

Providing end-to-end data delivery, segmentation, reassembly, and port addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which two main protocols operate at the Transport layer?

A

TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does TCP differ from UDP?

A

TCP is reliable and ordered; UDP is connectionless and faster but unreliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the function of OSI Layer 5 (Session)?

A

Establishing, managing, and terminating communication sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the function of OSI Layer 6 (Presentation)?

A

Formatting, encrypting, compressing, and encoding data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the function of OSI Layer 7 (Application)?

A

Providing network services directly to user applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What layer of the OSI Model is responsible for encryption?

A

Presentation Layer (Layer 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does TCP/IP stand for?
Transmission Control Protocol/Internet Protocol
26
How many layers are in the TCP/IP model?
Four layers
27
What are the four TCP/IP layers?
Network Access, Internet, Transport, Application
28
Which OSI layers are combined into TCP/IP's Network Access layer?
OSI Layers 1 and 2 (Physical and Data Link)
29
Which OSI layer corresponds to the TCP/IP Internet layer?
OSI Layer 3 (Network)
30
Which OSI layers are combined into the TCP/IP Application layer?
OSI Layers 5-7 (Session, Presentation, Application)
31
What is encapsulation in networking?
The process of adding headers and/or trailers to data as it moves down the network stack.
32
What is decapsulation in networking?
The process of removing headers and/or trailers as data moves up the network stack.
33
What is a protocol in network communication?
A standard, or set of rules, for communication between devices.
34
What address type is associated with the Data Link Layer?
MAC Address (Media Access Control)
35
What is the makeup of a MAC Address?
48 bits long: first 24 bits identify the manufacturer, second 24 bits are a unique identifier for the node.
36
What is the purpose of a MAC Address?
A MAC Address serves as a unique identifier (serial number) for network interfaces.
37
What devices are associated with the Data Link Layer?
Switches and Bridges
38
What is the data unit associated with the Data Link Layer?
Ethernet Frame
39
What address type is associated with the Network Layer?
IP Address
40
What devices are associated with the Network Layer?
Routers and Firewalls
41
What is the data unit associated with the Network Layer?
Packets
42
What address type is associated with the Transport Layer?
Ports
43
What is the data unit associated with the Transport Layer?
Segments
44
What does TCP stand for?
Transmission Control Protocol
45
What does UDP stand for?
User Datagram Protocol
46
What does FTP stand for?
File Transfer Protocol
47
What does SFTP stand for?
Secure File Transfer Protocol (or SSH File Transfer Protocol)
48
What port does FTP use?
Port 21
49
What port does SFTP use?
Port 22
50
What does SSH stand for?
Secure Shell (or Secure Socket Shell)
51
What port does SSH use?
Port 22
52
What does Telnet allow?
Logging into another computer on the same network (unencrypted remote access).
53
What port does Telnet use?
Port 23
54
What does SMTP stand for?
Simple Mail Transfer Protocol
55
What ports are associated with SMTP?
Port 25 (unsecured, server-to-server) and Port 587 (secured, client-to-server)
56
What does IMAP stand for?
Internet Mail Access Protocol
57
What is IMAP used for?
Accessing or retrieving email from a server while keeping messages stored on the server.
58
What ports are associated with IMAP?
Port 143 (insecure) and Port 993 (secure)
59
What does NTP stand for?
Network Time Protocol
60
What is NTP used for?
Synchronizing time across computer networks.
61
What port does NTP use?
Port 123
62
What does DNS stand for?
Domain Name System
63
What port does DNS use?
Port 53
64
What does DoT stand for?
DNS over TLS (Transport Layer Security)
65
What port does DoT use?
Port 853
66
What does HTTP stand for?
Hypertext Transfer Protocol
67
What does HTTPS stand for?
Hypertext Transfer Protocol Secure
68
What port does HTTP use?
Port 80
69
What port does HTTPS use?
Port 443
70
What does SNMP stand for?
Simple Network Management Protocol
71
What does SNMP do?
Manages how devices on a network share information, monitors network performance, identifies devices, and tracks network changes.
72
What ports does SNMP use?
Ports 161 and 162
73
What does LDAP stand for?
Lightweight Directory Access Protocol
74
What is LDAP used for?
Looking up user information, contact information, and network resources like email systems, printers, and user accounts.
75
What port does LDAP use?
Port 389
76
What does LDAPS stand for?
Lightweight Directory Access Protocol Secure
77
What port does LDAPS use?
Port 636
78
Why are network models organized into layers?
To separate concerns, simplify understanding, and allow independent development and troubleshooting of network functions.
79
What does it mean when a device is described as "Layer 7 capable"?
It can inspect or operate on application-layer data.
80
What does the presence of an address on a device suggest about security?
The device is susceptible to spoofing or impersonation as an attack vector.